Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7vvp-j573-5584 | Shopware: Unauthenticated data extraction possible through store-api.order endpoint |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shopware
Shopware platform Shopware shopware |
|
| Vendors & Products |
Shopware
Shopware platform Shopware shopware |
Wed, 11 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15. | |
| Title | Shopware unauthenticated data extraction possible through store-api.order endpoint | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T20:02:14.866Z
Reserved: 2026-03-09T21:59:02.687Z
Link: CVE-2026-31887
Updated: 2026-03-12T20:02:11.688Z
Status : Analyzed
Published: 2026-03-11T19:16:04.950
Modified: 2026-03-16T20:39:53.950
Link: CVE-2026-31887
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:56:56Z
Github GHSA